Fig. 1From: An artificial immunity approach to malware detection in a mobile platformNon-self detector set generationBack to article page